메뉴 건너뛰기




Volumn 5, Issue 1, 2008, Pages

Nuisance level of a voice call

Author keywords

Behavior; Multimedia communications; Nuisance; Presence; Security; Tolerance; Unwantedness

Indexed keywords

HUMAN COMPUTER INTERACTION; MULTIMEDIA SYSTEMS; TELECOMMUNICATION EQUIPMENT; TELECOMMUNICATION NETWORKS; TELEPHONE; TELEPHONE SETS; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 56349144261     PISSN: 15516857     EISSN: 15516865     Source Type: Journal    
DOI: 10.1145/1404880.1404886     Document Type: Article
Times cited : (16)

References (29)
  • 2
    • 56349169778 scopus 로고    scopus 로고
    • Is an HCI revolution just around the corner?
    • CANNY, J. 2006. Is an HCI revolution just around the corner? ACM Queue 4, 6.
    • (2006) ACM Queue , vol.4 , pp. 6
    • CANNY, J.1
  • 6
    • 56349094225 scopus 로고    scopus 로고
    • University of North Texas Internal Survey
    • DANTU, R. AND KOLAN, P. 2006. Survey of Calling Patterns. University of North Texas Internal Survey, http://secnet.csci.unt.edu/nuisance/.
    • (2006) Survey of Calling Patterns
    • DANTU, R.1    KOLAN, P.2
  • 9
    • 34247960076 scopus 로고
    • The strength of Weak Ties
    • GRANOVETTER, M. S. 1973. The strength of Weak Ties. Amer. J. Sociol. 78, 1360-1380.
    • (1973) Amer. J. Sociol , vol.78 , pp. 1360-1380
    • GRANOVETTER, M.S.1
  • 11
    • 61749086157 scopus 로고    scopus 로고
    • Identifying spam without peeking at the contents
    • HERSHKOP, S. AND STOLFO, S. J. 2004. Identifying spam without peeking at the contents. ACM Crossroads.
    • (2004) ACM Crossroads
    • HERSHKOP, S.1    STOLFO, S.J.2
  • 15
    • 34748856132 scopus 로고    scopus 로고
    • Automatic calibration using receiver operating characteristics curves
    • Bangalore, India
    • KOLAN, P., VAITHILINGAM, R., AND DANTU, R. 2007. Automatic calibration using receiver operating characteristics curves. In Comsware Workshop. Bangalore, India.
    • (2007) Comsware Workshop
    • KOLAN, P.1    VAITHILINGAM, R.2    DANTU, R.3
  • 17
    • 34748842226 scopus 로고    scopus 로고
    • LUCY, S. 2006. Is your VoIP phone vulnerable? http://www.businessweek.com/technology/content/jun2006/tc20060613_799282. htm?campaign_id=bier_tcj.
    • (2006) Is your VoIP phone vulnerable
    • LUCY, S.1
  • 18
    • 85043988965 scopus 로고
    • Finding similar files in a large file system
    • San Fransisco, CA
    • MANBER, U. 1994. Finding similar files in a large file system. In Usenix Winter (San Fransisco, CA), 1-10.
    • (1994) Usenix Winter , pp. 1-10
    • MANBER, U.1
  • 19
    • 84959839644 scopus 로고
    • Measuring tie strength
    • MARSDEN, P. V. AND CAMPBELL, K. E. 1984. Measuring tie strength. Social Forces 63, 2, 482-501.
    • (1984) Social Forces , vol.63 , Issue.2 , pp. 482-501
    • MARSDEN, P.V.1    CAMPBELL, K.E.2
  • 21
    • 33845791268 scopus 로고    scopus 로고
    • Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages
    • RIGOUTSOS, I. AND HUYNH, T. 2004. Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages. In Proceedings of the first Conference on E-mail and Anti-Spam.
    • (2004) Proceedings of the first Conference on E-mail and Anti-Spam
    • RIGOUTSOS, I.1    HUYNH, T.2
  • 23
    • 33947689306 scopus 로고    scopus 로고
    • The Session Initiation Protocol (SIP) and spam
    • draft-ietf-sipping-spam-02.txt
    • ROSENBERG, J., JENNINGS, C., AND PETERSON, J. 2006. The Session Initiation Protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txt
    • (2006) Spam Draft
    • ROSENBERG, J.1    JENNINGS, C.2    PETERSON, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.